Quiznetik
Cryptography and Network Security (CNS) | Set 1
1. In symmetric-key cryptography, the key locks and unlocks the box is
A. same
B. shared
C. private
D. public
Correct : A. same
2. The keys used in cryptography are
A. secret key
B. private key
C. public key
D. all of them
Correct : D. all of them
3. Cryptography, a word with Greek origins, means
A. corrupting data
B. secret writing
C. open writing
D. closed writing
Correct : B. secret writing
4. A transposition cipher reorders (permutes) symbols in a
A. block of packets
B. block of slots
C. block of signals
D. block of symbols
Correct : D. block of symbols
5. Network Security provides authentication and access control for resources.
A. true
B. false
Correct : A. true
6. Which is not an objective of network security?
A. identification
B. authentication
C. access control
D. lock
Correct : D. lock
7. The process of verifying the identity of a user.
A. authentication
B. identification
C. validation
D. verification
Correct : A. authentication
8. Which of these is a part of network identification?
A. user id
B. password
C. otp
D. fingerprint
Correct : A. user id
9. The process of transforming plain text into unreadable text.
A. decryption
B. encryption
C. network security
D. information hiding
Correct : B. encryption
10. An algorithm used in encryption is referred to as cipher.
A. true
B. false
Correct : A. true
11. A process of making the encrypted text readable again.
A. decryption
B. encryption
C. network security
D. information hiding
Correct : A. decryption
12. A person who enjoys learning details about computers and how to enhance their capabilities.
A. cracker
B. hacker
C. app controller
D. site controller
Correct : B. hacker
13. A small program that changes the way a computer operates.
A. worm
B. trojan
C. bomb
D. virus
Correct : D. virus
14. An asymmetric-key (or public-key) cipher uses
A. 1 key
B. 2 key
C. 3 key
D. 4 key
Correct : B. 2 key
15. We use cryptofraphy term to transform messages to make them secure and immune to
A. change
B. idle
C. attacks
D. defend
Correct : C. attacks
16. In cryptography , the original message before being transformmed , is called
A. simple text
B. plain text
C. empty text
D. filled text
Correct : B. plain text
17. A straight permutation cipher or a straight p-box has the same number of input as
A. cipher
B. frames
C. outputs
D. bits
Correct : C. outputs
18. The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not
A. authenticated
B. joined
C. submit
D. separate
Correct : A. authenticated
19. Which of the following is not a transport layer vulnerability?
A. mishandling of undefined , poorly defined
B. the vulnerability that allows fingerprinting & other enumeration of host information
C. overloading of transporting layer mechanisms
D. unauthorized network access
Correct : D. unauthorized network access
20. Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
A. true
B. false
Correct : A. true
21. TCP/IP model does not have layer but OSI model have this layer.
A. session layer
B. transport layer
C. application layer
D. network layer
Correct : A. session layer
22. In cryptography, what is cipher?
A. algorithm for performing encrption and decryption
B. encrypted message
C. both algorith for performing encrption and decryption and encrypted message
D. decrypted message
Correct : A. algorithm for performing encrption and decryption
23. In cryptography, the order of the letters in a message is rearranged by
A. transpositional ciphers
B. substitution ciphers
C. both
D. quadratic ciphers
Correct : A. transpositional ciphers
24. What is data encryption standard (DES)?
A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher
Correct : A. block cipher
25. Cryptanalysis is used
A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
Correct : A. to find some insecurity in a cryptographic scheme
26. Choose from among the following cipher systems, from best to the worst, with respect to ease of decryption using frequency analysis.
A. random polyalphabetic , plaintext , playfair
B. random polyalphabetic , playfair , vignere
C. random polyalphabetic , vignere , playfair , plaintext
D. random polyalphabetic , plaintext , beaufort , playfair
Correct : C. random polyalphabetic , vignere , playfair , plaintext
27. On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text-
A. abqdnwewuwjphfvrrtrfzn sdokvl
B. abqdvmwuwjphfvvyyrf znydokvl
C. tbqyrvmwuwjphfvvyy rfznydokvl
D. baiuvmwuwjphfoeiyrf znydokvl
Correct : B. abqdvmwuwjphfvvyyrf znydokvl
28. . Rail Fence Technique is an example of
A. substitution
B. transposition
C. product cipher
D. ceaser cipher
Correct : B. transposition
29. Public key encryption is advantageous over Symmetric key Cryptography because of
A. speed
B. space
C. key exchange
D. key length
Correct : C. key exchange
30. The sub key length at each round of DES is
A. 32
B. 56
C. 48
D. 64
Correct : B. 56
31. Which one is the strong attack mechanism?
A. chosen plaintext attack
B. chosen cipher text
C. brute force attack
D. man in the middle attack
Correct : C. brute force attack
32. Interception is an attack on
A. availability
B. confidentiality
C. integrity
D. authenticity
Correct : B. confidentiality
33. Chosen cipher text attack is based on
A. cryptanalysis
B. cryptography
C. encryption
D. decryption
Correct : A. cryptanalysis
34. The process of writing the text as rows and read it as columns is known as
A. vernam cipher
B. ceaser cipher
C. transposition columnar cipher
D. homophonic substitution cipher
Correct : C. transposition columnar cipher
35. Biometric authentication works on the basis of
A. human characteristics
B. passwords
C. smart cards
D. pin
Correct : A. human characteristics
36. Which layer filters the proxy firewall?
A. application
B. network
C. transport
D. none of the above
Correct : A. application
37. Encryption Strength is based on
A. strength of algorithm
B. secrecy of key
C. length of key
D. all of the above
Correct : D. all of the above
38. GCD(a,b) = GCD(b,a mod b)
A. true
B. false
C. cannot be determined
D. none
Correct : A. true
39. All groups satisfy properties
A. g-i to g-v
B. g-i to g-iv
C. g-i to r-v
D. r-i to r-v
Correct : C. g-i to r-v
40. An Abelian Group satisfies the properties
A. g-i to g-v
B. g-i to g-iv
C. g-i to r-v
D. r-i to r-v
Correct : A. g-i to g-v
41. A Ring satisfies the properties
A. r-i to r-v
B. g-i to g-iv
C. g-i to r-v
D. g-i to r-iii
Correct : D. g-i to r-iii
42. A Ring is said to be commutative if it also satisfies the property
A. r-vi
B. r-v
C. r-vii
D. r-iv
Correct : D. r-iv
43. An ‘Integral Domain’ satisfies the properties
A. g-i to g-iii
B. g-i to r-v
C. g-i to r-vi
D. g-i to r-iii
Correct : C. g-i to r-vi
44. Does the set of residue classes (mod 3) form a group with respect to modular addition?
A. yes
B. no
C. can\t say
D. insufficient data
Correct : A. yes
45. For the group Sn of all permutations of n distinct symbols, what is the number of elements in Sn?
A. n
B. n-1
C. 2n
D. n!
Correct : D. n!
46. a(b+c) = ac+bc is the representation for which property?
A. g-ii
B. g-iii
C. r-ii
D. r-iii
Correct : D. r-iii
47. a.(b.c) = (a.b).c is the representation for which property?
A. g-ii
B. g-iii
C. r-ii
D. r-iii
Correct : A. g-ii
48. AES uses a bit block size and a key size of bits.
A. 128; 128 or 256
B. 64; 128 or 192
C. 256; 128, 192, or 256
D. 128; 128, 192, or 256
Correct : D. 128; 128, 192, or 256
49. Like DES, AES also uses Feistel Structure.
A. true
B. false
C. cannot be determined
D. none
Correct : B. false
50. Which one of the following is not a cryptographic algorithm?
A. jupiter
B. blowfish
C. serpent
D. none
Correct : A. jupiter
51. If the key is 110100001, the output of the SP network for the plaintext: 101110001 is
A. 110100011
B. 110101110
C. 10110111
D. 11111010
Correct : B. 110101110
52. What is the number of possible 3 x 3 affine cipher transformations
A. 168
B. 840
C. 1024
D. 1344
Correct : D. 1344
53. What is the expanded key size of AES-192?
A. 44 words
B. 60 words
C. 52 words
D. 36 words
Correct : C. 52 words
54. In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ?
A. f(m1) + f(m2) + f(m3) + t
B. f(m1) + f(m2) + f(m3) +2t
C. f(m1) + f(m2) + f(m3)
D. 2(f(m1) + f(m2) + f(m3))
Correct : C. f(m1) + f(m2) + f(m3)
55. The 4×4 byte matrices in the AES algorithm are called
A. states
B. words
C. transitions
D. permutations
Correct : A. states
56. If the block size is ‘s’, how many affine transformations are possible ?
A. 2s (2s-1)(2s-1)(2s-12) ………(2s-1(s-1))
B. 2s (2s-1)(2s-2)(2s-22) ………(2s-2(s-2))
C. 2ss (2s-1)(2s-2)(2s-22) ………(2s-2(s-1))
D. 2s (2s-1)(2s-2)(2s-22) ………(2s-2(s-3))
Correct : C. 2ss (2s-1)(2s-2)(2s-22) ………(2s-2(s-1))
57. For the AES-128 algorithm there are similar rounds and round is different.
A. 2 pair of 5 similar rounds ; every alternate
B. 9 ; the last
C. 8 ; the first and last
D. 10 ; no
Correct : B. 9 ; the last
58. The DES Algorithm Cipher System consists of rounds (iterations) each with a round key
A. 9
B. 12
C. 18
D. 16
Correct : D. 16
59. DES follows
A. hash algorithm
B. caesars cipher
C. feistel cipher structure
D. sp networks
Correct : C. feistel cipher structure
60. Every cyclic group is .
A. a group with finite order
B. a group with prime order
C. a non abelian group
D. an abelian group
Correct : D. an abelian group
61. In the DES algorithm the round key is bit and the Round Input is bits
A. 48, 32
B. 64,32
C. 56, 24
D. 32, 32
Correct : A. 48, 32
62. is not a binary operation on the set of natural numbers.
A. addition
B. product
C. difference
D. none
Correct : C. difference
63. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via
A. scaling of the existing bits
B. duplication of the existing bits
C. addition of zeros
D. addition of ones
Correct : A. scaling of the existing bits
64. Which of the following is group under multiplication?
A. q
B. q-{0}
C. q-{1}
D. q-{0,1}
Correct : B. q-{0}
65. The Initial Permutation table/matrix is of size
A. 16×8
B. 4×8
C. 12×8
D. 8×8
Correct : D. 8×8
66. The number of unique substitution boxes in DES after the 48 bit XOR operation are
A. 8
B. 4
C. 6
D. 12
Correct : A. 8
67. The DES algorithm has a key length of
A. 128 bits
B. 32 bits
C. 64 bits
D. 16 bits
Correct : C. 64 bits
68. What is the size of the key in the SDES algorithm?
A. 24 bits
B. 16 bits
C. 20 bits
D. 10 bits
Correct : D. 10 bits
69. The Plaintext for the Ciphertext 10100101, given that the key is 0010010111 is
A. 1100111
B. 110110
C. 1001000
D. 1001100
Correct : B. 110110
70. Assume input 10-bit key, K: 1010000010 for the SDES algorithm. What is K1?
A. 10100100
B. 1011011
C. 1101000
D. 10100111
Correct : A. 10100100
71. Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K2?
A. 11101010
B. 11011011
C. 1101000
D. 10101111
Correct : A. 11101010
72. Which of the following is a mode of operation for the Block ciphers in cryptography?
A. a. electronic code book (ecb)
B. cipher block chaining (cbc)
C. counter (ctr) mode
D. all of the above
Correct : D. all of the above
73. Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. a. cbc (cipher block chaining)
B. ecb (electronic code book)
C. a. cfb (cipher text feed back)
D. all of the above
Correct : C. a. cfb (cipher text feed back)
74. The Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is
A. 1100111
B. 1010
C. 11111111
D. 1101101
Correct : C. 11111111
75. Which one of the following RC4 algorithm not used in?
A. ssl
B. tls
C. ftp
D. wep
Correct : C. ftp
76. Till when was the RC4 algorithm kept a secret?
A. 1990
B. 1992
C. 1996
D. 1994
Correct : D. 1994
77. The Plaintext for the Ciphertext 00100010, given that the key is 1111111111 is
A. 1100111
B. 1010
C. 1001000
D. 1001100
Correct : D. 1001100
78. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
A. authenticated
B. joined
C. submit
D. separate
Correct : A. authenticated
79. RSA is also a stream cipher like Merkel-Hellman
A. true
B. false
Correct : A. true
80. Rabin Cryptosystem is a variant of the Elgamal Cryptosystem
A. true
B. false
Correct : B. false
81. In RSA, Ф(n) = in terms of p and q
A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Correct : C. (p-1)(q-1)
82. In Asymmetric Key Cryptography, the two key, e and d, have a special relationship to
A. others
B. data
C. keys
D. each other
Correct : D. each other
83. Using Rabin cryptosystem with p=23 and q=7 ,Encrypt P=24 to find ciphertext. The Cipher text is
A. 42
B. 93
C. 74
D. 12
Correct : D. 12
84. For RSA to work, the value of P must be less than the value of
A. p
B. q
C. n
D. f
Correct : C. n
85. Session keys are transmitted after being encrypted by
A. make-shift keys
B. temporary keys
C. master keys
D. section
Correct : C. master keys
86. Which Cryptographic system uses C1 = (e1r) mod p and C1 = (e2r x P) mod p at the encryption side?
A. elgamal
B. rsa
C. rabin
D. whirlpool
Correct : A. elgamal
87. The certificate message is required for any agreed-on key exchange method except
A. ephemeral diffie- hellman
B. anonymous diffie- hellmanc
C. fixed diffie- hellmand.
D. rsa
Correct : B. anonymous diffie- hellmanc
88. Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the plaintext to be transmitted if the ciphertext is (28,9)
A. 45
B. 76
C. 66
D. 13
Correct : C. 66
89. In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
A. short
B. long
C. flat
D. thin
Correct : B. long
90. Which of the following is not a type of symmetric-key cryptography technique?
A. caesar cipher
B. data encryption standard (des)
C. diffie hellman cipher
D. playfair cipher
Correct : C. diffie hellman cipher
91. In Elgamal cryptosystem, given the prime p=31,Choose e1= first primitive root of p and d=10, calculate e2
A. 24
B. 36
C. 25
D. 62
Correct : C. 25
92. How many bytes of the secret key is generated using Diffie-Hellman encryption/decryption scheme?
A. 256
B. 871
C. 1024
D. 962
Correct : A. 256
93. Computation of the discrete logarithm is the basis of the cryptographic system
A. symmetric cryptography
B. asymmetric cryptography
C. diffie-hellman key exchange
D. secret key cryptography
Correct : C. diffie-hellman key exchange
94. In Elgamal cryptosystem, given the prime p=31,Encrypt the message “HELLO”; use 00 to 25 for encoding. The value of C2 for character ‘O’ is
A. 9
B. 7
C. 23
D. 27
Correct : A. 9
95. What is the block size of RC6 Feistel block cipher?
A. 5013 bits
B. 128 bits
C. 596 bits
D. 1768 bits
Correct : B. 128 bits
96. What is the general equation for elliptic curve systems
A. y3+b_1 xy+b_2 y=x33+a_1 x2+a_2 x+a_3
B. y3+b_1 x+b_2 y=x2+a_1 x2+a_2 x+a_3
C. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2
D. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3
Correct : D. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3
97. USENET falls under which category of public key sharing?
A. public announcement
B. publicly available directory
C. public-key authority
D. public-key certificates
Correct : A. public announcement
98. In Singular elliptic curve, the equation x^3+ax+b=0 does roots
A. does not have three distinct
B. has three distinct
C. has three unique
D. has three distinct unique
Correct : A. does not have three distinct
99. The value of 52003 mod 7 is(use fermat's theorem)
A. 3
B. 4
C. 8
D. 9
Correct : A. 3
100. Elliptic curve cryptography follows the associative property
A. true
B. false
Correct : A. true